Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing.
Pengtao LiuPublished in: IEEE Access (2020)
Keyphrases
- end to end
- public key encryption
- encryption scheme
- security mechanisms
- secure routing
- security measures
- public key
- security protocols
- cryptographic protocols
- stream cipher
- ad hoc networks
- proxy re encryption
- security issues
- multipath
- security requirements
- standard model
- cloud computing
- access control
- ciphertext
- security analysis
- security model
- cca secure
- sql injection
- key management
- identity based encryption